The present invention claims priority of provisional patent application No. 60/339,208, filed Dec. 03, 2001, the contents of which are incorporated herein.[0001]
BACKGROUNDIn mobile IP networks, when a mobile node (MN) moves from one cell to another, handover occurs. The result of the handover is that the MN connects to the network through a new access router (AR). The handover may occur between access routers of the same or different administrative domains. In all cases, the information related to the mobile node has to be transferred from the old AR to the new AR in order to minimize the effect of the change of access routers. This is the so-called context transfer.[0002]
During inter handovers, context related to MN are moved from old access router (say AR[0003]1) to new access router (say AR2). It may happen that the new access router AR2 or the new communication path established cannot meet the needs of existing active sessions or possible future sessions. For example, it may be that the available bandwidth along the new path is less than that of the previous one. Hence QoS may degrade. It may also be that AR2 does not support an encryption algorithm the MN may request for its future communication sessions. In all these cases, if the MN is not informed about the changes, the services to existing sessions may be degraded or compromised. In addition, the MN may send messages to initiate new sessions and those messages may be rejected by AR2 because AR2 cannot support the required services. This results in a waste of wireless bandwidth.
In wireless networks, bandwidth is a precious resource. Every effort should be make to efficiently utilize this resource. The above-mentioned references are exemplary only and are not meant to be limiting in respect to the resources and/or technologies available to those skilled in the art.[0004]
SUMMARYThe proposals in this invention comprise two aspects. First, we propose a mechanism where after a handover the MN is informed of the capability changes in AR and the new communication path. Second we propose a filter mechanism inside the MN to filter out messages that will be rejected by the new AR due to changes resulted from a handover.[0005]
BRIEF DESCRIPTION OF THE DRAWINGSThe disclosed inventions will be described with reference to the accompanying drawings, which show important sample embodiments of the invention, wherein:[0006]
FIG. 1 is a reference system for transferring context of a mobile node between autonomous systems; and[0007]
FIG. 2 shows how and when these filters are applied and used for normal operation.[0008]
DETAILED DESCRIPTIONAn embodiment may inform the Mobile Node (MN) about the changes of Access Router (AR) capabilities or the communication path. The MN will perform context filters for both incoming and outgoing packets accordingly. The advantages this embodiment may provide are:[0009]
1. Efficient utilization of wireless spectrum, by making decisions on the MN for out going packets;[0010]
2. For incoming packets received from the new access routers, the “context filter” rules are applied and, in case the packets get rejected, then these packets may be generated by hacker who is interested in attacking the MN;[0011]
3. If the service is degraded, and if there is an application level signaling, this is communicated to the application and the service levels may be renegotiated;[0012]
4. Reduces number of filtering rules in the Access routers and improves the performance significantly;[0013]
5. Seamless approach to change the subscription profile by the MN; and[0014]
6. This approach works as an extension to personal firewall on all MN.[0015]
FIG. 1 shows the reference architecture for the context transfer framework. For example, when the[0016]MN101 that is inAS1121 moves toAS2131, as per Policy based mechanisms for selecting access routers and mobile context relocation”,submitted IPR, U.S. application Ser. No. 60/336,937, Docket No. NC17419P, the context transfer takes place. It may happen that the new access router, e.g. AR2,133 or the new communication path established cannot meet the needs of existing active sessions or possible future sessions. For example, it may be that the available bandwidth along the new path is less than that of the previous one. Hence QoS may degrade. It may also be thatAR2133 does not support an encryption algorithm theMN101 may request for its future communication sessions.
An embodiment allows, after the context transfer is complete,[0017]AR2133 sends the MN101 a context completion message that includes the changes with AR capabilities and communication paths. The MN101 then updates the working set filter accordingly.
FIG. 2 shows how and when these filters are applied and used for normal operation in an exploded view of MN stack.[0018]
Precondition:[0019]
For example, MN[0020]253 has started to roam (either in home network or switched on in the different network) in either case the context filter is created. The AR that is currently serving the MN253 through Base Station (BS) updates the MN servicing profile to the MN253. Upon receiving this message, MN253 creates a context working set filters.
Operation (1):[0021]
1. For example, Application[0022]251 (say A) has started and wants to communicate to its CN.
2. Protocol stack in the MN[0023]253 consult thecontext filters255.
3. Context filters rules are applied based on the current working set.[0024]
4. If the capabilities are meet then the packet is forwarded to the Core Network (CN).[0025]
Operation (2):[0026]
1. For example, Application (say A) has started and wants to communicate to its CN.[0027]
2. Protocol stack in the[0028]MN253 consult the context filters255.
3. Context filters rules are applied based on the current working set.[0029]
4. If the context filter rules are not meet then the protocol layer generates an error[0030]204 (may be ICMP error) informing that this application cannot be executed and the application requirements are not meet.
5. It is up to the application to decide what to do next. It may give up or it may, for example, lower its requirements and initiate another session. In either case, messages that would be rejected by Access Router (AR) are never sent into the network.[0031]